Advance system and model to predict malicious files prorogation inside computer network

Advance system and model to predict malicious files prorogation inside computer network

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Networks — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

A new model for malicious file propagation and transmission in a computer network is formulated. This model introduced a cure rate (E-cure rate) which is calculated after the regular running of anti-virus in the systems of the computer network. This will result in monitoring the anti-virus efficiency in fighting not only a local malicious file but also the global spreading of such a file. The file has to go through different scenarios including many other states. Therefore, a vertical transmission concept is introduced in the proposed model. The threshold conditions for the stability of the proposed model are determined. Numerous methods are used to prove that the viral equilibrium points of our model are globally and locally stable. The behaviour of the compartment nodes in the computer network has been analysed. In addition, the optimal control theory is used to study immunisation strategies against Malware in order to control the economic losses of security investments and keep infection loss at the lowest possible level. The existence and uniqueness of results related to the system are confirmed. Finally, the simulation shows that the spread of malware can be effectively controlled by choosing the appropriate control strategy of specific parameters.

Related content

This is a required field
Please enter a valid email address